default search action
28th ESORICS 2023: The Hague, The Netherlands - Part I
- Gene Tsudik, Mauro Conti
, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14344, Springer 2024, ISBN 978-3-031-50593-5
Crypto
- Yavuz Akin, Jakub Klemsa, Melek Önen:
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth. 3-23 - Zhiyuan An
, Haibo Tian, Chao Chen
, Fangguo Zhang:
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. 24-44 - Yukimasa Sugizaki
, Hikaru Tsuchida
, Takuya Hayashi
, Koji Nuida
, Akira Nakashima
, Toshiyuki Isshiki, Kengo Mori:
Threshold Fully Homomorphic Encryption Over the Torus. 45-65 - Qi Wang, Haodong Huang, Juyan Li
, Qi Yuan:
Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation. 66-85 - Aysajan Abidin
, Erik Pohle
, Bart Preneel
:
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC. 86-105 - Minkyu Kim, Hyung Tae Lee:
Code-Based Secret Handshake Scheme, Revisited. 106-125 - Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, Xiangfu Song:
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage. 126-146 - Dennis Dayanikli
, Anja Lehmann:
Password-Based Credentials with Security Against Server Compromise. 147-167 - Marcel Tiepelt
, Edward Eaton, Douglas Stebila
:
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements. 168-188 - Jules Maire
, Damien Vergnaud
:
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems. 189-208 - Carmen Wabartha, Julian Liedtke
, Nicolas Huber
, Daniel Rausch
, Ralf Küsters
:
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations. 209-228 - Ravi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe, Shinsaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto, Nobuyuki Takeuchi:
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation. 229-248 - Lin Zhu, Qiang-Sheng Hua, Yi Chen, Hai Jin:
Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption. 249-269 - Katharina Boudgoust
, Akira Takahashi:
Sequential Half-Aggregation of Lattice-Based Signatures. 270-289 - Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian:
Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems. 290-312 - Ivo Maffei
, A. W. Roscoe
:
Optimally-Fair Multi-party Exchange Without Trusted Parties. 313-333 - Tae Min Ahn, Kang Hoon Lee, Joon Soo Yoo, Ji Won Yoon:
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain. 334-352 - Sohyun Jeon
, Hyang-Sook Lee
, Jeongeun Park
:
Practical Randomized Lattice Gadget Decomposition with Application to FHE. 353-371 - Théophile Brézot, Paola de Perthuis
, David Pointcheval
:
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE. 372-392 - Quang Cao
, Hong-Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang
, Jingge Zhu, Stanislav Kruglik
, Han Mao Kiah:
Committed Private Information Retrieval. 393-413 - You Lyu
, Shengli Liu
:
Two-Message Authenticated Key Exchange from Public-Key Encryption. 414-434 - Jules Maire
, Damien Vergnaud
:
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head. 435-454 - Laura Hetz
, Thomas Schneider
, Christian Weinert:
Scaling Mobile Private Contact Discovery to Billions of Users. 455-476
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.